LocalSocket.cpp 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <AK/Singleton.h>
  7. #include <AK/StringBuilder.h>
  8. #include <Kernel/Debug.h>
  9. #include <Kernel/FileSystem/FileDescription.h>
  10. #include <Kernel/FileSystem/VirtualFileSystem.h>
  11. #include <Kernel/Net/LocalSocket.h>
  12. #include <Kernel/Process.h>
  13. #include <Kernel/StdLib.h>
  14. #include <Kernel/UnixTypes.h>
  15. #include <LibC/errno_numbers.h>
  16. namespace Kernel {
  17. static AK::Singleton<Lockable<InlineLinkedList<LocalSocket>>> s_list;
  18. Lockable<InlineLinkedList<LocalSocket>>& LocalSocket::all_sockets()
  19. {
  20. return *s_list;
  21. }
  22. void LocalSocket::for_each(Function<void(const LocalSocket&)> callback)
  23. {
  24. LOCKER(all_sockets().lock(), Lock::Mode::Shared);
  25. for (auto& socket : all_sockets().resource())
  26. callback(socket);
  27. }
  28. KResultOr<NonnullRefPtr<Socket>> LocalSocket::create(int type)
  29. {
  30. return adopt_ref(*new LocalSocket(type));
  31. }
  32. LocalSocket::LocalSocket(int type)
  33. : Socket(AF_LOCAL, type, 0)
  34. {
  35. LOCKER(all_sockets().lock());
  36. all_sockets().resource().append(this);
  37. auto current_process = Process::current();
  38. m_prebind_uid = current_process->euid();
  39. m_prebind_gid = current_process->egid();
  40. m_prebind_mode = 0666;
  41. m_for_client.set_unblock_callback([this]() {
  42. evaluate_block_conditions();
  43. });
  44. m_for_server.set_unblock_callback([this]() {
  45. evaluate_block_conditions();
  46. });
  47. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) created with type={}", this, type);
  48. }
  49. LocalSocket::~LocalSocket()
  50. {
  51. LOCKER(all_sockets().lock());
  52. all_sockets().resource().remove(this);
  53. }
  54. void LocalSocket::get_local_address(sockaddr* address, socklen_t* address_size)
  55. {
  56. size_t bytes_to_copy = min(static_cast<size_t>(*address_size), sizeof(sockaddr_un));
  57. memcpy(address, &m_address, bytes_to_copy);
  58. *address_size = sizeof(sockaddr_un);
  59. }
  60. void LocalSocket::get_peer_address(sockaddr* address, socklen_t* address_size)
  61. {
  62. get_local_address(address, address_size);
  63. }
  64. KResult LocalSocket::bind(Userspace<const sockaddr*> user_address, socklen_t address_size)
  65. {
  66. VERIFY(setup_state() == SetupState::Unstarted);
  67. if (address_size != sizeof(sockaddr_un))
  68. return EINVAL;
  69. sockaddr_un address;
  70. if (!copy_from_user(&address, user_address, sizeof(sockaddr_un)))
  71. return EFAULT;
  72. if (address.sun_family != AF_LOCAL)
  73. return EINVAL;
  74. auto path = String(address.sun_path, strnlen(address.sun_path, sizeof(address.sun_path)));
  75. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) bind({})", this, path);
  76. mode_t mode = S_IFSOCK | (m_prebind_mode & 0777);
  77. UidAndGid owner { m_prebind_uid, m_prebind_gid };
  78. auto result = VFS::the().open(path, O_CREAT | O_EXCL | O_NOFOLLOW_NOERROR, mode, Process::current()->current_directory(), owner);
  79. if (result.is_error()) {
  80. if (result.error() == -EEXIST)
  81. return EADDRINUSE;
  82. return result.error();
  83. }
  84. auto file = move(result.value());
  85. VERIFY(file->inode());
  86. if (!file->inode()->bind_socket(*this))
  87. return EADDRINUSE;
  88. m_file = move(file);
  89. m_address = address;
  90. m_bound = true;
  91. return KSuccess;
  92. }
  93. KResult LocalSocket::connect(FileDescription& description, Userspace<const sockaddr*> address, socklen_t address_size, ShouldBlock)
  94. {
  95. VERIFY(!m_bound);
  96. if (address_size != sizeof(sockaddr_un))
  97. return EINVAL;
  98. u16 sa_family_copy;
  99. auto* user_address = reinterpret_cast<const sockaddr*>(address.unsafe_userspace_ptr());
  100. if (!copy_from_user(&sa_family_copy, &user_address->sa_family, sizeof(u16)))
  101. return EFAULT;
  102. if (sa_family_copy != AF_LOCAL)
  103. return EINVAL;
  104. if (is_connected())
  105. return EISCONN;
  106. const auto& local_address = *reinterpret_cast<const sockaddr_un*>(user_address);
  107. char safe_address[sizeof(local_address.sun_path) + 1] = { 0 };
  108. if (!copy_from_user(&safe_address[0], &local_address.sun_path[0], sizeof(safe_address) - 1))
  109. return EFAULT;
  110. safe_address[sizeof(safe_address) - 1] = '\0';
  111. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) connect({})", this, safe_address);
  112. auto description_or_error = VFS::the().open(safe_address, O_RDWR, 0, Process::current()->current_directory());
  113. if (description_or_error.is_error())
  114. return ECONNREFUSED;
  115. m_file = move(description_or_error.value());
  116. VERIFY(m_file->inode());
  117. if (!m_file->inode()->socket())
  118. return ECONNREFUSED;
  119. m_address.sun_family = sa_family_copy;
  120. memcpy(m_address.sun_path, safe_address, sizeof(m_address.sun_path));
  121. VERIFY(m_connect_side_fd == &description);
  122. set_connect_side_role(Role::Connecting);
  123. auto peer = m_file->inode()->socket();
  124. auto result = peer->queue_connection_from(*this);
  125. if (result.is_error()) {
  126. set_connect_side_role(Role::None);
  127. return result;
  128. }
  129. if (is_connected()) {
  130. set_connect_side_role(Role::Connected);
  131. return KSuccess;
  132. }
  133. auto unblock_flags = Thread::FileDescriptionBlocker::BlockFlags::None;
  134. if (Thread::current()->block<Thread::ConnectBlocker>({}, description, unblock_flags).was_interrupted()) {
  135. set_connect_side_role(Role::None);
  136. return EINTR;
  137. }
  138. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) connect({}) status is {}", this, safe_address, to_string(setup_state()));
  139. if (!has_flag(unblock_flags, Thread::FileDescriptionBlocker::BlockFlags::Connect)) {
  140. set_connect_side_role(Role::None);
  141. return ECONNREFUSED;
  142. }
  143. set_connect_side_role(Role::Connected);
  144. return KSuccess;
  145. }
  146. KResult LocalSocket::listen(size_t backlog)
  147. {
  148. LOCKER(lock());
  149. if (type() != SOCK_STREAM)
  150. return EOPNOTSUPP;
  151. set_backlog(backlog);
  152. auto previous_role = m_role;
  153. m_role = Role::Listener;
  154. set_connect_side_role(Role::Listener, previous_role != m_role);
  155. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) listening with backlog={}", this, backlog);
  156. return KSuccess;
  157. }
  158. KResult LocalSocket::attach(FileDescription& description)
  159. {
  160. VERIFY(!m_accept_side_fd_open);
  161. if (m_connect_side_role == Role::None) {
  162. VERIFY(m_connect_side_fd == nullptr);
  163. m_connect_side_fd = &description;
  164. } else {
  165. VERIFY(m_connect_side_fd != &description);
  166. m_accept_side_fd_open = true;
  167. }
  168. evaluate_block_conditions();
  169. return KSuccess;
  170. }
  171. void LocalSocket::detach(FileDescription& description)
  172. {
  173. if (m_connect_side_fd == &description) {
  174. m_connect_side_fd = nullptr;
  175. } else {
  176. VERIFY(m_accept_side_fd_open);
  177. m_accept_side_fd_open = false;
  178. }
  179. evaluate_block_conditions();
  180. }
  181. bool LocalSocket::can_read(const FileDescription& description, size_t) const
  182. {
  183. auto role = this->role(description);
  184. if (role == Role::Listener)
  185. return can_accept();
  186. if (role == Role::Accepted)
  187. return !has_attached_peer(description) || !m_for_server.is_empty();
  188. if (role == Role::Connected)
  189. return !has_attached_peer(description) || !m_for_client.is_empty();
  190. return false;
  191. }
  192. bool LocalSocket::has_attached_peer(const FileDescription& description) const
  193. {
  194. auto role = this->role(description);
  195. if (role == Role::Accepted)
  196. return m_connect_side_fd != nullptr;
  197. if (role == Role::Connected)
  198. return m_accept_side_fd_open;
  199. VERIFY_NOT_REACHED();
  200. }
  201. bool LocalSocket::can_write(const FileDescription& description, size_t) const
  202. {
  203. auto role = this->role(description);
  204. if (role == Role::Accepted)
  205. return !has_attached_peer(description) || m_for_client.space_for_writing();
  206. if (role == Role::Connected)
  207. return !has_attached_peer(description) || m_for_server.space_for_writing();
  208. return false;
  209. }
  210. KResultOr<size_t> LocalSocket::sendto(FileDescription& description, const UserOrKernelBuffer& data, size_t data_size, int, Userspace<const sockaddr*>, socklen_t)
  211. {
  212. if (!has_attached_peer(description))
  213. return EPIPE;
  214. auto* socket_buffer = send_buffer_for(description);
  215. if (!socket_buffer)
  216. return EINVAL;
  217. ssize_t nwritten = socket_buffer->write(data, data_size);
  218. if (nwritten > 0)
  219. Thread::current()->did_unix_socket_write(nwritten);
  220. return nwritten;
  221. }
  222. DoubleBuffer* LocalSocket::receive_buffer_for(FileDescription& description)
  223. {
  224. auto role = this->role(description);
  225. if (role == Role::Accepted)
  226. return &m_for_server;
  227. if (role == Role::Connected)
  228. return &m_for_client;
  229. return nullptr;
  230. }
  231. DoubleBuffer* LocalSocket::send_buffer_for(FileDescription& description)
  232. {
  233. auto role = this->role(description);
  234. if (role == Role::Connected)
  235. return &m_for_server;
  236. if (role == Role::Accepted)
  237. return &m_for_client;
  238. return nullptr;
  239. }
  240. KResultOr<size_t> LocalSocket::recvfrom(FileDescription& description, UserOrKernelBuffer& buffer, size_t buffer_size, int, Userspace<sockaddr*>, Userspace<socklen_t*>, Time&)
  241. {
  242. auto* socket_buffer = receive_buffer_for(description);
  243. if (!socket_buffer)
  244. return EINVAL;
  245. if (!description.is_blocking()) {
  246. if (socket_buffer->is_empty()) {
  247. if (!has_attached_peer(description))
  248. return 0;
  249. return EAGAIN;
  250. }
  251. } else if (!can_read(description, 0)) {
  252. auto unblock_flags = Thread::FileDescriptionBlocker::BlockFlags::None;
  253. if (Thread::current()->block<Thread::ReadBlocker>({}, description, unblock_flags).was_interrupted())
  254. return EINTR;
  255. }
  256. if (!has_attached_peer(description) && socket_buffer->is_empty())
  257. return 0;
  258. VERIFY(!socket_buffer->is_empty());
  259. auto nread = socket_buffer->read(buffer, buffer_size);
  260. if (nread > 0)
  261. Thread::current()->did_unix_socket_read(nread);
  262. return nread;
  263. }
  264. StringView LocalSocket::socket_path() const
  265. {
  266. size_t len = strnlen(m_address.sun_path, sizeof(m_address.sun_path));
  267. return { m_address.sun_path, len };
  268. }
  269. String LocalSocket::absolute_path(const FileDescription& description) const
  270. {
  271. StringBuilder builder;
  272. builder.append("socket:");
  273. builder.append(socket_path());
  274. switch (role(description)) {
  275. case Role::Listener:
  276. builder.append(" (listening)");
  277. break;
  278. case Role::Accepted:
  279. builder.appendff(" (accepted from pid {})", origin_pid());
  280. break;
  281. case Role::Connected:
  282. builder.appendff(" (connected to pid {})", acceptor_pid());
  283. break;
  284. case Role::Connecting:
  285. builder.append(" (connecting)");
  286. break;
  287. default:
  288. break;
  289. }
  290. return builder.to_string();
  291. }
  292. KResult LocalSocket::getsockopt(FileDescription& description, int level, int option, Userspace<void*> value, Userspace<socklen_t*> value_size)
  293. {
  294. if (level != SOL_SOCKET)
  295. return Socket::getsockopt(description, level, option, value, value_size);
  296. socklen_t size;
  297. if (!copy_from_user(&size, value_size.unsafe_userspace_ptr()))
  298. return EFAULT;
  299. switch (option) {
  300. case SO_SNDBUF:
  301. TODO();
  302. case SO_RCVBUF:
  303. TODO();
  304. case SO_PEERCRED: {
  305. if (size < sizeof(ucred))
  306. return EINVAL;
  307. switch (role(description)) {
  308. case Role::Accepted:
  309. if (!copy_to_user(static_ptr_cast<ucred*>(value), &m_origin))
  310. return EFAULT;
  311. size = sizeof(ucred);
  312. if (!copy_to_user(value_size, &size))
  313. return EFAULT;
  314. return KSuccess;
  315. case Role::Connected:
  316. if (!copy_to_user(static_ptr_cast<ucred*>(value), &m_acceptor))
  317. return EFAULT;
  318. size = sizeof(ucred);
  319. if (!copy_to_user(value_size, &size))
  320. return EFAULT;
  321. return KSuccess;
  322. case Role::Connecting:
  323. return ENOTCONN;
  324. default:
  325. return EINVAL;
  326. }
  327. break;
  328. }
  329. default:
  330. return Socket::getsockopt(description, level, option, value, value_size);
  331. }
  332. }
  333. KResult LocalSocket::chmod(FileDescription&, mode_t mode)
  334. {
  335. if (m_file)
  336. return m_file->chmod(mode);
  337. m_prebind_mode = mode & 0777;
  338. return KSuccess;
  339. }
  340. KResult LocalSocket::chown(FileDescription&, uid_t uid, gid_t gid)
  341. {
  342. if (m_file)
  343. return m_file->chown(uid, gid);
  344. auto current_process = Process::current();
  345. if (!current_process->is_superuser() && (current_process->euid() != uid || !current_process->in_group(gid)))
  346. return EPERM;
  347. m_prebind_uid = uid;
  348. m_prebind_gid = gid;
  349. return KSuccess;
  350. }
  351. NonnullRefPtrVector<FileDescription>& LocalSocket::recvfd_queue_for(const FileDescription& description)
  352. {
  353. auto role = this->role(description);
  354. if (role == Role::Connected)
  355. return m_fds_for_client;
  356. if (role == Role::Accepted)
  357. return m_fds_for_server;
  358. VERIFY_NOT_REACHED();
  359. }
  360. NonnullRefPtrVector<FileDescription>& LocalSocket::sendfd_queue_for(const FileDescription& description)
  361. {
  362. auto role = this->role(description);
  363. if (role == Role::Connected)
  364. return m_fds_for_server;
  365. if (role == Role::Accepted)
  366. return m_fds_for_client;
  367. VERIFY_NOT_REACHED();
  368. }
  369. KResult LocalSocket::sendfd(const FileDescription& socket_description, FileDescription& passing_description)
  370. {
  371. LOCKER(lock());
  372. auto role = this->role(socket_description);
  373. if (role != Role::Connected && role != Role::Accepted)
  374. return EINVAL;
  375. auto& queue = sendfd_queue_for(socket_description);
  376. // FIXME: Figure out how we should limit this properly.
  377. if (queue.size() > 128)
  378. return EBUSY;
  379. queue.append(move(passing_description));
  380. return KSuccess;
  381. }
  382. KResultOr<NonnullRefPtr<FileDescription>> LocalSocket::recvfd(const FileDescription& socket_description)
  383. {
  384. LOCKER(lock());
  385. auto role = this->role(socket_description);
  386. if (role != Role::Connected && role != Role::Accepted)
  387. return EINVAL;
  388. auto& queue = recvfd_queue_for(socket_description);
  389. if (queue.is_empty()) {
  390. // FIXME: Figure out the perfect error code for this.
  391. return EAGAIN;
  392. }
  393. return queue.take_first();
  394. }
  395. }